US8891767B2 - Method and apparatus for direct counterfactual quantum communication - Google Patents
Method and apparatus for direct counterfactual quantum communication Download PDFInfo
- Publication number
- US8891767B2 US8891767B2 US13/723,517 US201213723517A US8891767B2 US 8891767 B2 US8891767 B2 US 8891767B2 US 201213723517 A US201213723517 A US 201213723517A US 8891767 B2 US8891767 B2 US 8891767B2
- Authority
- US
- United States
- Prior art keywords
- path
- photon
- photons
- probability
- finding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H04B10/30—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H04L9/0883—
Definitions
- This invention relates to communications systems. More particularly, it relates to the encrypted communication of information.
- quantum mechanics has been an enormous successful theory since its inception about a century ago, its conceptual foundation is often a matter of intense debate. Furthermore, several novel phenomena are predicted and observed based on quantum mechanics that appear counterintuitive and are unexplainable in the classical domain. Whole new fields owe their existence to this body of knowledge.
- One such field is quantum communication.
- a new mode of communication is used whereby no physical particles travel between sender and receiver.
- the two most celebrated quantum key distribution (QKD) protocols the BB84 [see, e.g., C. H. Bennett and G. Brassard, 1985, IBM Tech. Discil Bull. 28, 3153 (1985).] and E-91 [see, e.g., A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991)] both utilize basic ingredients from “quantum money” including that of a qubit and the use of non-orthogonal quantum states to encode information. While the security of the BB84 and E-91, as well as a host of other QKD protocols, are guaranteed by the laws of physics, imperfect practical implementation can lead to serious loopholes, leaving them vulnerable to attack [L. Lydersen, C.
- Gerhardt et al. I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer and V. Makarov, Nature Comm 2, 349 (2011)] have demonstrated in a laboratory setting, using an intercept-resend strategy, how to successfully obtain the secret random key shared by two legitimate parties, Sender and Receiver, in two commercially available QKD systems, without leaving a trace.
- This effect may be demonstrated using a setup such as the one illustrated in FIG. 1 .
- the photon “probability wave” will both pass through half-silvered mirror BS 1 (take the route to the right in FIG. 1 ) and be reflected (take the left route). If the observer is not present, the photon will not be absorbed, and so the wave continues along the right route to the second half silvered mirror BS 2 (where it will encounter the left wave and cause self-interference).
- the system reduces to the basic Mach-Zehnder apparatus with no observer present, in which case constructive interference occurs along the path exiting towards detector D 2 in FIG. 1 and destructive interference occurs along the path exiting towards detector D 1 . Therefore, the detector D 2 will detect a photon, and the detector D 1 will not.
- the wave function collapses and the photon must either be on the left route or on the right route, but not both.
- the photon is measured on the route on the right in FIG. 1 , because the observer is present, the photon is absorbed. If the photon is measured on the left route, it will not encounter the observer but since the right route cannot have been taken, there will be no interference effect at BS 2 . The photon on the left route now both passes through BS 2 and is reflected. Upon meeting further observers (detectors D 1 and D 2 ), the wave function collapses again and the photon must be either at detector D 1 or at detector D 2 , but not both. Thus it can be stated that if any photons are detected at detector D 1 , there must have been a detector at the observer position.
- the presence or absence of an observer could be used to encode information—e.g., the presence of an “observer” could represent a logical 1 and the absence a logical 0.
- the yield rate of such a system is too low to make this practical. The present invention solves this problem.
- the logic of counterfactual cryptography is taken to its natural conclusion.
- quantum Zeno effect [see, e.g., P. G. Kwiat, A. G. White, J. R. Mitchell, O. Nairz, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 83, 4725 (1999)] (which refers to the fact that repeated measurement of an evolving quantum system can inhibit its evolution, leaving it in its initial state, an effect often paraphrased as “a watched kettle never boils”), the efficiency of such interaction-free measurements can be dramatically boosted. In the ideal limit, information may be directly exchanged between a Sender and a Receiver with no physical particles traveling between them, thus achieving direct counterfactual communication.
- S is the light source
- C is the optical circulator
- D 1 and D 2 and D 3 and D 4 are photon detectors
- PBS stands for a polarizing beam-splitter that only reflects vertically polarized photons (V)
- SPR stands for switchable polarization rotator
- PC Pockels cell which determines the polarization state of the transmitted photons
- SM switchable mirror
- MR magnetic resonance
- OD stands for optical delay
- the two optical paths SM 1 ⁇ MR 1 and SM 1 ⁇ MR B for the first Michelson interferometer correspond to the outer cycle of the chained quantum Zeno effect CQZE (M cycles) for the Mach-Zehnder setup (see FIG. 3 ), while the paths SM 2 ⁇ MR 2 and SM 2 ⁇ MR B for the second Michelson interferometer, correspond to the inner cycle of the CQZE (N cycles).
- the mirror SM 1(2) may be switched off initially to allow the photon to be transmitted but it may then remain on for M(N) cycles, and may be turned off again after M(N) cycles are completed.
- OD 1 and OD 2 guarantee that optical distances of different paths of same interferometer exactly match.
- the Sender (“Bob”) may pass an H photon by turning off his PC reflecting it back, and he may block an H photon by turning on his PC, changing the photon's polarization to V.
- An optical gate controlled by the Message Receiver (“Alice”) through a classical channel and an OD B in the quantum channel may also be added.
- the time delay device may be used to protect the Sender's (“Bob's”) bit choices from an Eavesdropper (“Eve”). It will be appreciated by those skilled in the art that the chance of the Receiver's (“Alice's”) photon leaking into the quantum channel is almost zero for large enough M and N.
- FIG. 1 is a diagram of an experiment of the prior art wherein a photon may be observed on one particular path of a Mach-Zehnder interferometer.
- FIG. 2 is schematic representation of a communication system according to one embodiment of the invention.
- FIG. 3 is a schematic representation of a Mach-Zehnder setup that illustrates the working principle of the invention.
- FIGS. 4 a and 4 b are probability plots for detector activation versus number of cycles.
- FIG. 5 a is a probability plot of detector activation versus imperfections of the switchable polarization rotators.
- FIG. 5 b is a probability plot of detector activation versus system noise (defined by the blocking rate of each cycle by any object other than the intended Receiver).
- FIG. 2 One embodiment of the invention is shown diagrammatically in FIG. 2 .
- the Receiver's end (“Alice”), it is composed of two parts.
- the first part consists of a light source S that sends a stream of horizontally polarized (H) photons, detectors (D 1 , D 2 and D 3 ), and a polarizing beam-splitter PBS 0 which only reflects vertically polarized photons V (as do all the PBS in the figure).
- the second part comprises two tandem Michelson interferometers. It includes two PBSs, two switchable polarization rotators (SPRs), two switchable mirrors (SMs) that can be switched on and off by external means, and two normal mirrors (MRs).
- SPRs switchable polarization rotators
- SMs switchable mirrors
- MRs normal mirrors
- the Message Sender's setup (“Bob”) also includes two parts.
- the Sender with the help of Pockel cell PC B , can either switch the polarization of the incoming H photon to a V photon or keep the polarization state H unchanged.
- the PBS B reflects V photons to a detector D 4 (effectively blocking the communication channel) and allows H photons to be reflected back by the mirror MR B .
- the second part is a time delay system whose purpose is to defend the Sender against an attack from an Eavesdropper (“Eve”).
- the Sender can send a stream of logic 0's and 1's by either keeping the polarization state H unchanged (logic 0) or switching it to polarization state V (logic 1).
- the Sender's choice of logic 0 and 1 leads to a click at detectors D 1 and D 2 , respectively with almost unit probability and with almost no photon in the public channel, thus leading to direct counterfactual communication.
- This setup may be implemented using current technology. However, before explaining how the setup works, it is useful to discuss an equivalent Mach-Zehnder type setup shown in FIG. 3 which helps to understand the working principle of the invention.
- BS stands for beam-splitter and SW stands for ideal switches.
- the photon is accessible to the Eavesdropper.
- FIG. 3 As shown in the portion of FIG. 3 indicated as (b), by using a chained version of the setup shown in portion (a), direct counterfactual quantum communication can be achieved.
- beam splitters BSs which have large reflectivity. One is BS M , for M big cycles. The other is BS N for N small cycles within each M cycle.
- SW ideal switches
- the Sender allows the Receiver's photon to pass, by switching off all SWs at his end, the initial state
- the final state is
- the photonic state after n cycles is
- the square of the overall factor cos 2(n ⁇ 1) ⁇ represents the probability of having the state
- the Sender's blocking causes detector D 1 to click, while passing the photon causes detector D 2 to click.
- the Receiver can read the Sender's bit choices with arbitrarily large efficiency. This is the first step towards direct counterfactual quantum communication.
- the protocol is not counterfactual.
- 01 implies the photon passing through the transmission channel with unit probability at Nth cycle, where the risk that the Receiver's signal photon is stolen becomes very high.
- the protocol is also not counterfactual as the photon travels through the public channel in the case where the Sender does not block the photon.
- the present invention uses a protocol that leads not only to direct communication between the Sender and the Receiver but is also counterfactual.
- a chained version of the quantum Zeno effect (CQZE) is used, as shown in FIG. 3( b ).
- detector D 2 clicks. Again the counterfactuality is ensured by a click at D 2 as any photon in the public channel would be absorbed by the blocking device and would not be available for detection at D 2 .
- FIGS. 4 a and 4 b the probabilities P 1 and P 2 (which are the probabilities of D 1 and D 2 clicking, respectively) are plotted using the above recursion relations.
- P 1 and P 2 are plotted against different number of cycles M and N for the Sender unblocking the Receiver's photon ( FIG. 4 a ) and the Sender obstructing the Receiver's photon ( FIG. 4 b ). It may clearly be seen that P 1 is above 0.90 for M>25 and is independent of N. However, a value of P 2 above 0.90 requires not only M>25 but a much larger value of N.
- the initial photon emitted by the light source is
- H . Since the signal photon passes through SMs twice each cycle, one may set ⁇ 1(2) ⁇ 4M(N). It is not difficult to see that, if the Sender blocks the photon, detector D 2 clicks. Also, if the Sender passes the photon, detector D 1 clicks.
- the effect of the imperfections of the system and the noise in the transmission channel on the performance of the counterfactual communication are considered.
- the imperfections There are two kinds of imperfections. The first one only affects the efficiency of the communication, but does not cause the measurement errors.
- the imperfection coming from the sensitivity of the detectors D 1 , D 2 and D 3 is an example of this imperfection. If the sensitivity of these detectors is ⁇ , then the efficiency of the communication also reduces to ⁇ .
- the second kind of imperfection which mainly comes from the switchable polarization rotators (SPRs), results in the measurement errors. During each cycle, SPRs should rotate the signal photon with a certain angle, but in practical situations there can be a slight error in the angle.
- SPRs switchable polarization rotators
- FIG. 5 b is a plot of the probability of D 1 clicking (the Sender passing the photon) with different noise B defined by the blocking rate of each cycle by any object except the Sender.
- switchable mirrors are also very important.
- the distance between the Sender and the Receiver is L.
- the control time of these switchable mirrors should be less than 2 L/c 0 (c 0 being the light speed).
- the first is an intercept-resend attack whereby for the case where the Sender blocks the quantum channel the Eavesdropper unblocks the channel by replacing the Sender's setup, ideally at the last outer cycles.
- the Eavesdropper measures and resends upon detection.
- N and M are kept secret by the Receiver, it can be proved that the Eavesdropper cannot, on average, intercept the Receiver's photons and resend them without being detected herself. It is not difficult to see, without the knowledge of N and M, the random replacement for the Sender's setup will decrease the probability the Eavesdropper catching the Receiver's test photon. Meanwhile, the chance D 3 clicking will increase anomalously.
- the second attack by the Eavesdropper involves using a similar counterfactual setup (avoiding clicking D 4 ) to read out the Sender's information. Since the Sender cannot distinguish the source of the photon, the Eavesdropper can attack the Sender's setup almost whenever she wants to. This attack can be avoided by means of the time delay setup shown in FIG. 2 .
- the red dashed line is a classical channel used by the Receiver to control an optical gate positioned before the Sender's setup. The component of the Receiver's photon (with almost zero probability amplitude) can pass through it only if the gate is open. A long optical delay (OD 3 ) is added into the transmission path before the gate.
- the Eavesdropper Since she does not know when the Receiver will send her photon component in, the Eavesdropper needs to measure the control signals in the classical channel in order to get gate information. Suppose the Eavesdropper can catch the control signal and resend it straight on. She immediately starts her counterfactual attack on the Sender. It takes T′+ ⁇ time for her photon component to reach the gate. However, the gate opening time is from T′ to T′+ ⁇ . Thus if ⁇ >> ⁇ t, it is impossible for the Eavesdropper's photon to get into the Sender's setup. For the next gate opening time (the next photon cycle), the Receiver can still change the optical distance in her setup. This means the Eavesdropper cannot know the correct gate opening time.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optics & Photonics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Optical Communication System (AREA)
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
Abstract
Description
|10→cos θ|10+sin θ|01,|01→cos θ|01−sin θ|10 (1)
where cos θ=√{square root over (R)} with R being the reflectivity of the BS.
|10→cos nθ|10+sin nθ|01 (2)
|10→cosn−1θ(cos θ|10+sin θ|01)≈|10 (3)
where N is assumed to be large and cosN θ≈1. Here the square of the overall factor cos2(n−1)θ represents the probability of having the state |10 after n−1 cycles. In this case the detector D1 clicks.
where it is assumed N>>1. After the m-th cycle, the photon state is
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/723,517 US8891767B2 (en) | 2012-12-21 | 2012-12-21 | Method and apparatus for direct counterfactual quantum communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/723,517 US8891767B2 (en) | 2012-12-21 | 2012-12-21 | Method and apparatus for direct counterfactual quantum communication |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140177837A1 US20140177837A1 (en) | 2014-06-26 |
US8891767B2 true US8891767B2 (en) | 2014-11-18 |
Family
ID=50974698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/723,517 Active US8891767B2 (en) | 2012-12-21 | 2012-12-21 | Method and apparatus for direct counterfactual quantum communication |
Country Status (1)
Country | Link |
---|---|
US (1) | US8891767B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10389525B2 (en) | 2014-10-30 | 2019-08-20 | Alibaba Group Holding Limited | Method, apparatus, and system for quantum key distribution, privacy amplification, and data transmission |
US10505724B2 (en) | 2015-08-18 | 2019-12-10 | Alibaba Group Holding Limited | Authentication method, apparatus and system used in quantum key distribution process |
US11489667B2 (en) * | 2020-07-13 | 2022-11-01 | First Quantum Inc. | Method of correcting gravity-induced error in quantum cryptography system, method of quantum cryptography authentification using the same, and user terminal and server |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9794656B2 (en) * | 2015-12-11 | 2017-10-17 | Huawei Technologies Co., Ltd. | Modular photonic switch architecture |
CN107508677B (en) * | 2017-10-18 | 2020-05-05 | 浙江工商大学 | Safe multiparty quantum summation negotiation method based on quantum Fourier transform |
KR101978774B1 (en) * | 2017-10-20 | 2019-05-15 | 한국전자통신연구원 | Quantum direct communication method based on user authentication and apparatus using the same |
WO2019180770A1 (en) * | 2018-03-19 | 2019-09-26 | 日本電気株式会社 | Method and device for adjusting drive timing of photon detector, and optical communication system |
WO2021038281A1 (en) * | 2019-08-30 | 2021-03-04 | Telefonaktiebolaget Lm Ericsson (Publ) | A round-free cryptographic hashing device for secure and low-latency communications |
CN112968735B (en) * | 2021-02-09 | 2022-04-22 | 中国人民解放军国防科技大学 | Anti-fact quantum communication chip |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7180645B2 (en) * | 2003-04-01 | 2007-02-20 | Canon Kabushiki Kaisha | Quantum-state-generating apparatus, Bell measurement apparatus, quantum gate apparatus, and method for evaluating fidelity of quantum gate |
US8149494B1 (en) * | 2007-09-07 | 2012-04-03 | The United States Of America As Represented By The Secretary Of The Navy | Two-photon absorption switch having which-path exclusion and monolithic mach-zehnder interferometer |
-
2012
- 2012-12-21 US US13/723,517 patent/US8891767B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7180645B2 (en) * | 2003-04-01 | 2007-02-20 | Canon Kabushiki Kaisha | Quantum-state-generating apparatus, Bell measurement apparatus, quantum gate apparatus, and method for evaluating fidelity of quantum gate |
US8149494B1 (en) * | 2007-09-07 | 2012-04-03 | The United States Of America As Represented By The Secretary Of The Navy | Two-photon absorption switch having which-path exclusion and monolithic mach-zehnder interferometer |
Non-Patent Citations (17)
Title |
---|
Avella et al. Report of proof-of-principle implementations of novel QKD schemes performed at INRIM. Poce. Of SPIE vol. 8542, 85421N, 2012. * |
Ekert, Artur K., "Quantum Cryptography Based on Bell's Theorem," The American Physical Society, Physical Review Letters, vol. 67, No. 6, Aug. 5, 1991, pp. 661-663. |
Elitzur, Avshalom C. et al., "Quantum Mechanical Interaction-Free Measurements," Foundations of Physics, vol. 23, No. 7, Jan. 2, 1993, pp. 987-997. |
Gerhardt, Ilja et al., "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Communications, 2:349, DOI: 10.1038/ncomms1348, www.nature.com/naturecommunications, Jun. 14, 2011, 6 pages. |
Hosten et al. "Counterfactual quantum comptation through quantum interrogation" Nature vol. 439, Feb. 2006. * |
Huang et al. "Interaction and measurement-free quantum Zeno gates for universal computation with single-atom and single-photon qubits" The American Physical Society, Physical Review Letters, Jun. 2008. * |
Kwiat et al. "Interaction-free measurement" The American Physical Society, Physical Review Letters, vol. 74, No. 24, Jun. 1995. * |
Kwiat et al. "Quantum seeing in the dark" Scientific American Nov. 1996. * |
Kwiat, P. G. et al, "High-Efficiency Quantum Interrogation Measurements via the Quantum Zeno Effect," The American Physical Society, Physical Review Letters, vol. 83, No. 23, Dec. 6, 1999, pp. 4725-4728. |
Liu et al. "Experimental demonstration of counterfactual quantum communication" American Physical Society, Physicalo Review Letters, Jul. 2012. * |
Lydersen, Lars et al., "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, Letters, vol. 4, Aug. 29, 2010, pp. 686-689. |
Noh "Counterfactual-quantum cryptography" The American Physical Society, Physical Review Letters, Dec. 2009. * |
Noh, Tae-Gon, "Counterfactual Quantum Cryptography," The American Physical Society, Physical Review Letters, vol. 103, 230501, Dec. 4, 2009, 4 pages. |
Ren et al. "Experimental demonstration of counterfactual quantum key distribution" Laser Physics, vol. 21, No. 4, 2011, pp. 755-760. * |
Ren M. et al., "Experimental Demonstration of Counterfactual Quantum Key Distribution," Laser Physics, vol. 21, No. 4, Mar. 4, 2011, pp. 755-760. |
Wiesner, Stephen, "Conjugate Coding," Department of Physics, Columbia University, New York, 1983, 11 pages. |
Wootters, W. K. et al., "A single quantum cannot be cloned," Nature Publishing Group, Letters to Nature, vol. 299, Oct. 28, 1982, pp. 802-803. |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10389525B2 (en) | 2014-10-30 | 2019-08-20 | Alibaba Group Holding Limited | Method, apparatus, and system for quantum key distribution, privacy amplification, and data transmission |
US10505724B2 (en) | 2015-08-18 | 2019-12-10 | Alibaba Group Holding Limited | Authentication method, apparatus and system used in quantum key distribution process |
US11489667B2 (en) * | 2020-07-13 | 2022-11-01 | First Quantum Inc. | Method of correcting gravity-induced error in quantum cryptography system, method of quantum cryptography authentification using the same, and user terminal and server |
Also Published As
Publication number | Publication date |
---|---|
US20140177837A1 (en) | 2014-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8891767B2 (en) | Method and apparatus for direct counterfactual quantum communication | |
Salih et al. | Protocol for direct counterfactual quantum communication | |
Hu et al. | Experimental quantum secure direct communication with single photons | |
Diamanti et al. | Practical challenges in quantum key distribution | |
Takesue et al. | Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors | |
Kim | Single-photon two-qubit entangled states: Preparation and measurement | |
Berlín et al. | Experimental loss-tolerant quantum coin flipping | |
Ostermeyer et al. | On the implementation of a deterministic secure coding protocol using polarization entangled photons | |
KR20200022627A (en) | Apparatus and method for measurement immune quantum key distribution | |
US8184986B2 (en) | Detection arrangement | |
He | Simplified quantum bit commitment using single photon nonlocality | |
Wei et al. | Feasible attack on detector-device-independent quantum key distribution | |
Mandal et al. | Multi-photon implementation of three-stage quantum cryptography protocol | |
Morris et al. | A survey of quantum key distribution (QKD) technologies | |
Ahn et al. | High-dimensional single photon based quantum secure direct communication using time and phase mode degrees | |
US20240340091A1 (en) | Encoder, decoder, systems and methods for d-dimensional frequency-encoded quantum communication and information processing | |
Alhussein et al. | Monitoring coincident clicks in differential-quadrature-phase shift QKD to reveal detector blinding and control attacks | |
Ozhegov et al. | Quantum key distribution over 300 | |
El Rifai et al. | Implementation of an m-ary three-stage quantum cryptography protocol | |
Nikhil Pradeep et al. | Quantum cryptography protocols for IOE security: A perspective | |
Zhang | Probabilistic direct counterfactual quantum communication | |
Jacak et al. | Quantum key distribution security constraints caused by controlled quality of dark channel for non-entangled and entangled photon quantum cryptography setups | |
Rumyantsev et al. | Modeling of quantum key distribution system for secure information transfer | |
Vybornyi et al. | Backflash light as a security vulnerability in quantum key distribution systems | |
US11962689B2 (en) | Quantum communications system having at least one waveplate to alter pulse polarization and associated methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THE TEXAS A&M UNIVERSITY SYSTEM, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZUBAIRY, MUHAMMAD SUHAIL;LI, ZHENGHONG;SIGNING DATES FROM 20121221 TO 20130211;REEL/FRAME:029931/0712 Owner name: KING ABDULAZIZ CITY FOR SCIENCE AND TECHNOLOGY, SA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AL-AMRI, MOHAMMAD D.;SALIH, HATIM A.;REEL/FRAME:029931/0912 Effective date: 20121227 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551) Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |